Enterprise malware threat detection and response
HBGary and Verdasys announced an integrated enterprise security solution to detect and control malware threats. Available in July, the solution will feature HBGary’s …
Next-generation Trojan plunders East European bank accounts
Russian and Ukrainian banks have been lately trying to stop the onslaught of BlackEnergy 2, a Trojan that manages to bypass the Java application that the customers use to …
WordPress 3.0 released
WordPress 3.0, the thirteenth major release of WordPress and the culmination of half a year of work by 218 contributors, is now available for download and comes with 1,217 bug …
Text message phishing attacks drop significantly
Text-to-phone phishing attacks (often called “smishing”) dropped dramatically in the first quarter of 2010, according to a report by Internet Identity (IID). …
Free Internet security book for kids
As unstructured summertime looms, kids and teens are likely to be spending more time on the Internet. Now, a free download is available to help them keep themselves safer both …
Anti-virus Immunet Protect 2.0 released
Immunet released Protect Free 2.0, the latest version of the real-time anti-virus software for Windows. Immunet Protect is designed specifically to protect consumers and their …
Months-old Skype vulnerability exploited in the wild
A Skype flaw patched some 9 months ago with the new version (4.1.0.179) of the VoIP client has been spotted being exploited in the wild. According to M86 Security Labs, the …
Financial services firms hesitant to adopt cloud computing
Today’s financial services firms are avoiding popular IT infrastructure investments such as cloud computing, in large part due to data security and transparency …
New book: “Microsoft SQL Server 2008 Administrator’s Pocket Consultant”
Microsoft SQL Server 2008 Administrator’s Pocket Consultant, 2nd Edition is a concise, immediate reference you’ll want with you at all times as you deal with SQL …
iTunes 9.2 fixes security vulnerabilities
iTunes 9.2 comes with several new features, improvements and security fixes. ColorSync A heap buffer overflow exists in the handling of images with an embedded ColorSync …
(IN)SECURE Magazine issue 26 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 26 has been released today. Table of contents PCI: …
Nessus now audits Cisco routers and switches
Nessus now includes the ability to perform security and policy compliance configuration audits of Cisco IOS routers and switches. The audits are based on best practices …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage